Course Outline
- Explaining the Importance of Security Controls and Security Intelligence:
- Utilizing Threat Data and Intelligence:
- Analyzing Security Monitoring Data:
- Collecting and Querying Security Monitoring Data
- Utilizing Digital Forensics and Indicator Analysis Techniques:
- Applying Incident Response Procedures:
- Applying Risk Mitigation and Security Frameworks:
- Performing Vulnerability Management:
- Applying Security Solutions for Infrastructure Management:
- Understanding Data Privacy and Protection
- Applying Security Solutions for Software Assurance
- Applying Security Solutions for Cloud and Automation:
Requirements
Recommended Network+, Security+ or equivalent knowledge. Minimum of 4 years of hands-on experience in technical cybersecurity role
Testimonials (8)
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
A wide range of knowledge of the lecturer.
Marcin Szklarski - Santander Consumer Bank
Course - CCSK Plus (Certificate of Cloud Security Knowledge - Plus)
Lot's of information explained very well. Good examples, interesting exercises. Trainer showed us his real world experience.
Gergely Bathó - GE Medical Systems Polska Sp. Z O.O.
Course - Application Security for Developers
Lap Qradar
Sutthikan Noisombat - NTT
Course - IBM Qradar SIEM: Beginner to Advanced
The simple explanation of the trainer
Mohammed salem - Palestinian Police
Course - Open Source Intelligence (OSINT) Advanced
Accessing tools and being able to ask questions to someone friendly who I felt wouldn't judge me
Kiara
Course - Open Source Cyber Intelligence - Introduction
The Burpe suite i need more training in this
Gontse Ntshegi - Vodacom
Course - Android Security
Azure web security, it was more what i was expecting, the penetration testing i would never do in my job